SlideShare ist ein Scribd-Unternehmen logo
1 von 13
Downloaden Sie, um offline zu lesen
Consequence driven decomposition
of large-scale power system security
analysis
Florence Fonteneau-Belmudes∗, Damien Ernst∗,
Christophe Druet†, Patrick Panciatici‡, Louis
Wehenkel∗
*University of Li`ege, Belgium - † ELIA (Belgian TSO) - ‡ RTE (French TSO)
2010 IREP Symposium, Buzios, Rio de Janeiro, Brazil, 1-6 August 2010
Power system security assessment
Power system security assessment = Identifying
contingencies/scenarios that could lead to unacceptable
operating conditions (dangerous contingencies) if no
preventive actions were taken.
Problem may be approximated by running a security
analysis for every element of a set of potentially
dangerous contingencies.
Size of this set of potentially dangerous contingencies:
• grows with the size of the power system
• grows with increasing uncertainties about the future
power injection patterns, load patterns and system
topologies.
Question: What should you do when the size of the set
becomes so large that you cannot screen every
contingency one by one?
2
Traditional solutions:
• Increase the computational resources (note that the
security analysis task can be easily parallelized).
• Use filtering techniques (= simplified conservative
analysis techniques) to identify a subset of
contingencies on which the full security analysis is
carried out.
Shortcomings:
• Do not work in case of very large number of
contingencies (say for example 1010).
• Reliable and efficient filtering techniques are difficult
to develop.
3
Our solution
A generic approach to identify dangerous contingencies
by running a full security analysis for a number of
contingencies greater that the number of dangerous ones
but much smaller than the number of potentially
dangerous contingencies.
Why generic? Work whatever the type of security
analysis (e.g., static security, transient stability, voltage
stability).
Come atop of existing security analysis tools and can be
combined with any of them.
4
And no magic is necessary for the approach to work...
5
How does it work:
1. Draw at random a subset of contingencies C.
2. Run a security analysis for every element of C. Add
the dangerous contingencies to the set DC.
3. Use the information collected from the security
analyses to draw a new set C more likely to contain
new dangerous contingencies.
4. If computational resources are exhausted output DC,
else go back to 2.
6
3. Use the information collected from the security analyses to draw a new
set C more likely to contain new dangerous contingencies.
Tools needed:
• A post-processor of the security analysis results to
associate to a contingency a severity index (e.g., amount
of load lost in the post-fault configuration).
• A method to embed the contingency space in a compact
metric space where the severity indices vary in a
“progressive way”.
Solution:
1. Identify among the contingencies already analyzed those
with the highest severity index.
2. Identify among a family of sampling densities over the
compact metric space, the one which is the most likely to
generate the contingencies identified at Step 1.
3. Draw a new set C using the sampling density identified at
Step 2.
7
Illustrative example
Test network:
Set of potentially dangerous contingencies: N-1
contigencies, loss of a transmission element, 634 elements.
Available computational resources: 125 security analyses
(load-flows) can be carried out.
What we want: To identify the 6 contingencies that cause an
overload on a critical transmission line.
8
Tools needed:
• A post-processor of the security analysis results to associate to a
contingency a severity index (e.g., amount of load lost in the post-fault
configuration).
• A method to embed the contingency space in a compact metric space
where the severity indices vary in a “progressive way”.
• Severity index: overload on the critical transmission line.
• Compact metric space: the plane is divided into
surfaces corresponding to the contingencies according to
their location on the geographical map.
9
A typical run of the algorithm with multi-dimensional
Gaussian sampling densities:
Iteration 1 Iteration 2
Iteration 3 Iteration 4
10
Probability of finding at least
n dangerous contingencies.
n Our approach Monte Carlo
1 0.99 0.69
2 0.90 0.31
3 0.76 0.09
4 0.47 0.04
5 0.20 0
6 0.04 0
Comments:
• Results get even better with the decrease of the ratio:
number of dangerous contingencies
number of potentially dangerous contingencies
• Many improvements have already been brought to the
basic version of the approach presented here.
11
Willing to know more...
“Consequence driven decomposition of large-scale power system security
analysis”. F. Fonteneau-Belmudes, D. Ernst, C. Druet, P. Panciatici and L.
Wehenkel. In Proceedings of the 2010 IREP Symposium - Bulk Power
Systems Dynamics and Control - VIII, Buzios, Rio de Janeiro, Brazil, 1-6
August 2010. (8 pages).
“Pseudo-geographical representations of power system buses by
multidimensional scaling”. F. Belmudes, D. Ernst and L. Wehenkel. In
Proceedings of the 15th International Conference on Intelligent System
Applications to Power Systems (ISAP 2009), Curitiba, Brazil, 8-12 November
2009. (6 pages).
“A rare-event approach to build security analysis tools when N − k (k > 1)
analyses are needed (as they are in large-scale power systems)”. F. Belmudes,
D. Ernst and L. Wehenkel. In Proceedings of the 2009 IEEE Bucharest Power
Tech Conference, June 28th-July 2nd, Bucharest, Romania. (8 pages).
“Cross-entropy based rare-event simulation for the identification of dangerous
events in power systems”. F. Belmudes, D. Ernst and L. Wehenkel. In
Proceedings of the 10th International Conference on Probabilistic Methods
Applied to Power Systems (PMAPS-08), pages 1290-1295. Rincon, Puerto
Rico, 25-29 May 2008.
12

Weitere ähnliche Inhalte

Andere mochten auch

Architecture to Scale. DONN ROCHETTE at Big Data Spain 2012
Architecture to Scale. DONN ROCHETTE at Big Data Spain 2012Architecture to Scale. DONN ROCHETTE at Big Data Spain 2012
Architecture to Scale. DONN ROCHETTE at Big Data Spain 2012Big Data Spain
 
Presentation on Big Data Analytics
Presentation on Big Data AnalyticsPresentation on Big Data Analytics
Presentation on Big Data AnalyticsS P Sajjan
 
What are the Top Supplements for Seniors?
What are the Top Supplements for Seniors?What are the Top Supplements for Seniors?
What are the Top Supplements for Seniors?Jaclyn Werner
 
The 33 best gifts for travelers in 2014
The 33 best gifts for travelers in 2014The 33 best gifts for travelers in 2014
The 33 best gifts for travelers in 2014Pieter Prinsloo
 
Integration of renewable energy sources and demand-side management into distr...
Integration of renewable energy sources and demand-side management into distr...Integration of renewable energy sources and demand-side management into distr...
Integration of renewable energy sources and demand-side management into distr...Université de Liège (ULg)
 
2014 World Auto Forum & Awards
2014 World Auto Forum & Awards2014 World Auto Forum & Awards
2014 World Auto Forum & AwardsPooja Singh
 
Quantitative Systems Pharmacology Speaker Pack
Quantitative Systems Pharmacology Speaker PackQuantitative Systems Pharmacology Speaker Pack
Quantitative Systems Pharmacology Speaker PackKaterina Josephides
 
Mr John Berrill - Employment, superannuation & insurance issues for people wi...
Mr John Berrill - Employment, superannuation & insurance issues for people wi...Mr John Berrill - Employment, superannuation & insurance issues for people wi...
Mr John Berrill - Employment, superannuation & insurance issues for people wi...Peer Support Network
 
Mobile Printing Across Various Industries
Mobile Printing Across Various IndustriesMobile Printing Across Various Industries
Mobile Printing Across Various IndustriesADCBarcode
 
Batteries and disrupting business models for the energy sector
Batteries and disrupting business models for the energy sectorBatteries and disrupting business models for the energy sector
Batteries and disrupting business models for the energy sectorUniversité de Liège (ULg)
 

Andere mochten auch (16)

Architecture to Scale. DONN ROCHETTE at Big Data Spain 2012
Architecture to Scale. DONN ROCHETTE at Big Data Spain 2012Architecture to Scale. DONN ROCHETTE at Big Data Spain 2012
Architecture to Scale. DONN ROCHETTE at Big Data Spain 2012
 
Presentation on Big Data Analytics
Presentation on Big Data AnalyticsPresentation on Big Data Analytics
Presentation on Big Data Analytics
 
Pill Camera ppt
Pill Camera pptPill Camera ppt
Pill Camera ppt
 
PILL CAMERA
PILL CAMERAPILL CAMERA
PILL CAMERA
 
What are the Top Supplements for Seniors?
What are the Top Supplements for Seniors?What are the Top Supplements for Seniors?
What are the Top Supplements for Seniors?
 
The 33 best gifts for travelers in 2014
The 33 best gifts for travelers in 2014The 33 best gifts for travelers in 2014
The 33 best gifts for travelers in 2014
 
Integration of renewable energy sources and demand-side management into distr...
Integration of renewable energy sources and demand-side management into distr...Integration of renewable energy sources and demand-side management into distr...
Integration of renewable energy sources and demand-side management into distr...
 
2014 World Auto Forum & Awards
2014 World Auto Forum & Awards2014 World Auto Forum & Awards
2014 World Auto Forum & Awards
 
Mgw Pitch Deck
Mgw Pitch DeckMgw Pitch Deck
Mgw Pitch Deck
 
Quantitative Systems Pharmacology Speaker Pack
Quantitative Systems Pharmacology Speaker PackQuantitative Systems Pharmacology Speaker Pack
Quantitative Systems Pharmacology Speaker Pack
 
Mr John Berrill - Employment, superannuation & insurance issues for people wi...
Mr John Berrill - Employment, superannuation & insurance issues for people wi...Mr John Berrill - Employment, superannuation & insurance issues for people wi...
Mr John Berrill - Employment, superannuation & insurance issues for people wi...
 
The Global Grid
The Global GridThe Global Grid
The Global Grid
 
My Green World Pitch Deck
My Green World Pitch DeckMy Green World Pitch Deck
My Green World Pitch Deck
 
Mobile Printing Across Various Industries
Mobile Printing Across Various IndustriesMobile Printing Across Various Industries
Mobile Printing Across Various Industries
 
La transition énergétique, l'affaire de tous
La transition énergétique, l'affaire de tousLa transition énergétique, l'affaire de tous
La transition énergétique, l'affaire de tous
 
Batteries and disrupting business models for the energy sector
Batteries and disrupting business models for the energy sectorBatteries and disrupting business models for the energy sector
Batteries and disrupting business models for the energy sector
 

Ähnlich wie Consequence driven decomposition of large-scale power system security analysis

Big Data Framework for Predictive Risk Assessment of Weather Impacts on Elect...
Big Data Framework for Predictive Risk Assessment of Weather Impacts on Elect...Big Data Framework for Predictive Risk Assessment of Weather Impacts on Elect...
Big Data Framework for Predictive Risk Assessment of Weather Impacts on Elect...Power System Operation
 
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS On false-data-injection-attacks-...
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS On false-data-injection-attacks-...IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS On false-data-injection-attacks-...
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS On false-data-injection-attacks-...IEEEGLOBALSOFTSTUDENTPROJECTS
 
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On false-data-injection-attacks-a...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On false-data-injection-attacks-a...2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On false-data-injection-attacks-a...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On false-data-injection-attacks-a...IEEEGLOBALSOFTSTUDENTSPROJECTS
 
Draft comparison of electronic reliability prediction methodologies
Draft comparison of electronic reliability prediction methodologiesDraft comparison of electronic reliability prediction methodologies
Draft comparison of electronic reliability prediction methodologiesAccendo Reliability
 
INTELLIGENT MALWARE DETECTION USING EXTREME LEARNING MACHINE
INTELLIGENT MALWARE DETECTION USING EXTREME LEARNING MACHINEINTELLIGENT MALWARE DETECTION USING EXTREME LEARNING MACHINE
INTELLIGENT MALWARE DETECTION USING EXTREME LEARNING MACHINEIRJET Journal
 
Applications of Artificial Neural Networks in Cancer Prediction
Applications of Artificial Neural Networks in Cancer PredictionApplications of Artificial Neural Networks in Cancer Prediction
Applications of Artificial Neural Networks in Cancer PredictionIRJET Journal
 
Lung Cancer Detection Using Convolutional Neural Network
Lung Cancer Detection Using Convolutional Neural NetworkLung Cancer Detection Using Convolutional Neural Network
Lung Cancer Detection Using Convolutional Neural NetworkIRJET Journal
 
JPJ1439 On False Data-Injection Attacks against Power System State Estimation...
JPJ1439 On False Data-Injection Attacks against Power System State Estimation...JPJ1439 On False Data-Injection Attacks against Power System State Estimation...
JPJ1439 On False Data-Injection Attacks against Power System State Estimation...chennaijp
 
Crowd Density Estimation Using Base Line Filtering
Crowd Density Estimation Using Base Line FilteringCrowd Density Estimation Using Base Line Filtering
Crowd Density Estimation Using Base Line Filteringpaperpublications3
 
Management of Power System Dynamic Security
Management of Power System Dynamic Security Management of Power System Dynamic Security
Management of Power System Dynamic Security Power System Operation
 
On false data injection attacks against power system
On false data injection attacks against power systemOn false data injection attacks against power system
On false data injection attacks against power systemShakas Technologies
 
Intelligent Wireless Sensor Network Simulation: Flood Use Case
Intelligent Wireless Sensor Network Simulation: Flood Use CaseIntelligent Wireless Sensor Network Simulation: Flood Use Case
Intelligent Wireless Sensor Network Simulation: Flood Use Casecatherine roussey
 
on false data-injection attacks against power system state estimation modelin...
on false data-injection attacks against power system state estimation modelin...on false data-injection attacks against power system state estimation modelin...
on false data-injection attacks against power system state estimation modelin...swathi78
 
Fuzzy-Based Multiple Path Selection Method for Improving Energy Efficiency in...
Fuzzy-Based Multiple Path Selection Method for Improving Energy Efficiency in...Fuzzy-Based Multiple Path Selection Method for Improving Energy Efficiency in...
Fuzzy-Based Multiple Path Selection Method for Improving Energy Efficiency in...aciijournal
 
Novel Methodology of Data Management in Ad Hoc Network Formulated using Nanos...
Novel Methodology of Data Management in Ad Hoc Network Formulated using Nanos...Novel Methodology of Data Management in Ad Hoc Network Formulated using Nanos...
Novel Methodology of Data Management in Ad Hoc Network Formulated using Nanos...Drjabez
 
عرض تقديمي1.pptx
عرض تقديمي1.pptxعرض تقديمي1.pptx
عرض تقديمي1.pptxssuserf314411
 

Ähnlich wie Consequence driven decomposition of large-scale power system security analysis (20)

Big Data Framework for Predictive Risk Assessment of Weather Impacts on Elect...
Big Data Framework for Predictive Risk Assessment of Weather Impacts on Elect...Big Data Framework for Predictive Risk Assessment of Weather Impacts on Elect...
Big Data Framework for Predictive Risk Assessment of Weather Impacts on Elect...
 
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS On false-data-injection-attacks-...
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS On false-data-injection-attacks-...IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS On false-data-injection-attacks-...
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS On false-data-injection-attacks-...
 
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On false-data-injection-attacks-a...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On false-data-injection-attacks-a...2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On false-data-injection-attacks-a...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On false-data-injection-attacks-a...
 
Draft comparison of electronic reliability prediction methodologies
Draft comparison of electronic reliability prediction methodologiesDraft comparison of electronic reliability prediction methodologies
Draft comparison of electronic reliability prediction methodologies
 
ICSRS_R038.pptx
ICSRS_R038.pptxICSRS_R038.pptx
ICSRS_R038.pptx
 
INTELLIGENT MALWARE DETECTION USING EXTREME LEARNING MACHINE
INTELLIGENT MALWARE DETECTION USING EXTREME LEARNING MACHINEINTELLIGENT MALWARE DETECTION USING EXTREME LEARNING MACHINE
INTELLIGENT MALWARE DETECTION USING EXTREME LEARNING MACHINE
 
Kost for china-2011
Kost for china-2011Kost for china-2011
Kost for china-2011
 
Applications of Artificial Neural Networks in Cancer Prediction
Applications of Artificial Neural Networks in Cancer PredictionApplications of Artificial Neural Networks in Cancer Prediction
Applications of Artificial Neural Networks in Cancer Prediction
 
Lung Cancer Detection Using Convolutional Neural Network
Lung Cancer Detection Using Convolutional Neural NetworkLung Cancer Detection Using Convolutional Neural Network
Lung Cancer Detection Using Convolutional Neural Network
 
JPJ1439 On False Data-Injection Attacks against Power System State Estimation...
JPJ1439 On False Data-Injection Attacks against Power System State Estimation...JPJ1439 On False Data-Injection Attacks against Power System State Estimation...
JPJ1439 On False Data-Injection Attacks against Power System State Estimation...
 
Crowd Density Estimation Using Base Line Filtering
Crowd Density Estimation Using Base Line FilteringCrowd Density Estimation Using Base Line Filtering
Crowd Density Estimation Using Base Line Filtering
 
Management of Power System Dynamic Security
Management of Power System Dynamic Security Management of Power System Dynamic Security
Management of Power System Dynamic Security
 
AI: Belief Networks
AI: Belief NetworksAI: Belief Networks
AI: Belief Networks
 
AI: Belief Networks
AI: Belief NetworksAI: Belief Networks
AI: Belief Networks
 
On false data injection attacks against power system
On false data injection attacks against power systemOn false data injection attacks against power system
On false data injection attacks against power system
 
Intelligent Wireless Sensor Network Simulation: Flood Use Case
Intelligent Wireless Sensor Network Simulation: Flood Use CaseIntelligent Wireless Sensor Network Simulation: Flood Use Case
Intelligent Wireless Sensor Network Simulation: Flood Use Case
 
on false data-injection attacks against power system state estimation modelin...
on false data-injection attacks against power system state estimation modelin...on false data-injection attacks against power system state estimation modelin...
on false data-injection attacks against power system state estimation modelin...
 
Fuzzy-Based Multiple Path Selection Method for Improving Energy Efficiency in...
Fuzzy-Based Multiple Path Selection Method for Improving Energy Efficiency in...Fuzzy-Based Multiple Path Selection Method for Improving Energy Efficiency in...
Fuzzy-Based Multiple Path Selection Method for Improving Energy Efficiency in...
 
Novel Methodology of Data Management in Ad Hoc Network Formulated using Nanos...
Novel Methodology of Data Management in Ad Hoc Network Formulated using Nanos...Novel Methodology of Data Management in Ad Hoc Network Formulated using Nanos...
Novel Methodology of Data Management in Ad Hoc Network Formulated using Nanos...
 
عرض تقديمي1.pptx
عرض تقديمي1.pptxعرض تقديمي1.pptx
عرض تقديمي1.pptx
 

Mehr von Université de Liège (ULg)

Reinforcement learning for electrical markets and the energy transition
Reinforcement learning for electrical markets and the energy transitionReinforcement learning for electrical markets and the energy transition
Reinforcement learning for electrical markets and the energy transitionUniversité de Liège (ULg)
 
Algorithms for the control and sizing of renewable energy communities
Algorithms for the control and sizing of renewable energy communitiesAlgorithms for the control and sizing of renewable energy communities
Algorithms for the control and sizing of renewable energy communitiesUniversité de Liège (ULg)
 
AI for energy: a bright and uncertain future ahead
AI for energy: a bright and uncertain future aheadAI for energy: a bright and uncertain future ahead
AI for energy: a bright and uncertain future aheadUniversité de Liège (ULg)
 
Extreme engineering for fighting climate change and the Katabata project
Extreme engineering for fighting climate change and the Katabata projectExtreme engineering for fighting climate change and the Katabata project
Extreme engineering for fighting climate change and the Katabata projectUniversité de Liège (ULg)
 
Ex-post allocation of electricity and real-time control strategy for renewabl...
Ex-post allocation of electricity and real-time control strategy for renewabl...Ex-post allocation of electricity and real-time control strategy for renewabl...
Ex-post allocation of electricity and real-time control strategy for renewabl...Université de Liège (ULg)
 
Harvesting wind energy in Greenland: a project for Europe and a huge step tow...
Harvesting wind energy in Greenland: a project for Europe and a huge step tow...Harvesting wind energy in Greenland: a project for Europe and a huge step tow...
Harvesting wind energy in Greenland: a project for Europe and a huge step tow...Université de Liège (ULg)
 
Décret favorisant le développement des communautés d’énergie renouvelable
Décret favorisant le développement des communautés d’énergie renouvelableDécret favorisant le développement des communautés d’énergie renouvelable
Décret favorisant le développement des communautés d’énergie renouvelableUniversité de Liège (ULg)
 
Harnessing the Potential of Power-to-Gas Technologies. Insights from a prelim...
Harnessing the Potential of Power-to-Gas Technologies. Insights from a prelim...Harnessing the Potential of Power-to-Gas Technologies. Insights from a prelim...
Harnessing the Potential of Power-to-Gas Technologies. Insights from a prelim...Université de Liège (ULg)
 
Reinforcement learning, energy systems and deep neural nets
Reinforcement learning, energy systems and deep neural nets Reinforcement learning, energy systems and deep neural nets
Reinforcement learning, energy systems and deep neural nets Université de Liège (ULg)
 
Soirée des Grands Prix SEE - A glimpse at the research work of the laureate o...
Soirée des Grands Prix SEE - A glimpse at the research work of the laureate o...Soirée des Grands Prix SEE - A glimpse at the research work of the laureate o...
Soirée des Grands Prix SEE - A glimpse at the research work of the laureate o...Université de Liège (ULg)
 
Reinforcement learning for data-driven optimisation
Reinforcement learning for data-driven optimisationReinforcement learning for data-driven optimisation
Reinforcement learning for data-driven optimisationUniversité de Liège (ULg)
 
Electricity retailing in Europe: remarkable events (with a special focus on B...
Electricity retailing in Europe: remarkable events (with a special focus on B...Electricity retailing in Europe: remarkable events (with a special focus on B...
Electricity retailing in Europe: remarkable events (with a special focus on B...Université de Liège (ULg)
 
Projet de décret « GRD »: quelques remarques du Prof. Damien ERNST
Projet de décret « GRD »: quelques remarques du Prof. Damien ERNSTProjet de décret « GRD »: quelques remarques du Prof. Damien ERNST
Projet de décret « GRD »: quelques remarques du Prof. Damien ERNSTUniversité de Liège (ULg)
 
Time to make a choice between a fully liberal or fully regulated model for th...
Time to make a choice between a fully liberal or fully regulated model for th...Time to make a choice between a fully liberal or fully regulated model for th...
Time to make a choice between a fully liberal or fully regulated model for th...Université de Liège (ULg)
 
Electrification and the Democratic Republic of the Congo
Electrification and the Democratic Republic of the CongoElectrification and the Democratic Republic of the Congo
Electrification and the Democratic Republic of the CongoUniversité de Liège (ULg)
 

Mehr von Université de Liège (ULg) (20)

Reinforcement learning for electrical markets and the energy transition
Reinforcement learning for electrical markets and the energy transitionReinforcement learning for electrical markets and the energy transition
Reinforcement learning for electrical markets and the energy transition
 
Algorithms for the control and sizing of renewable energy communities
Algorithms for the control and sizing of renewable energy communitiesAlgorithms for the control and sizing of renewable energy communities
Algorithms for the control and sizing of renewable energy communities
 
AI for energy: a bright and uncertain future ahead
AI for energy: a bright and uncertain future aheadAI for energy: a bright and uncertain future ahead
AI for energy: a bright and uncertain future ahead
 
Extreme engineering for fighting climate change and the Katabata project
Extreme engineering for fighting climate change and the Katabata projectExtreme engineering for fighting climate change and the Katabata project
Extreme engineering for fighting climate change and the Katabata project
 
Ex-post allocation of electricity and real-time control strategy for renewabl...
Ex-post allocation of electricity and real-time control strategy for renewabl...Ex-post allocation of electricity and real-time control strategy for renewabl...
Ex-post allocation of electricity and real-time control strategy for renewabl...
 
Big infrastructures for fighting climate change
Big infrastructures for fighting climate changeBig infrastructures for fighting climate change
Big infrastructures for fighting climate change
 
Harvesting wind energy in Greenland: a project for Europe and a huge step tow...
Harvesting wind energy in Greenland: a project for Europe and a huge step tow...Harvesting wind energy in Greenland: a project for Europe and a huge step tow...
Harvesting wind energy in Greenland: a project for Europe and a huge step tow...
 
Décret favorisant le développement des communautés d’énergie renouvelable
Décret favorisant le développement des communautés d’énergie renouvelableDécret favorisant le développement des communautés d’énergie renouvelable
Décret favorisant le développement des communautés d’énergie renouvelable
 
Harnessing the Potential of Power-to-Gas Technologies. Insights from a prelim...
Harnessing the Potential of Power-to-Gas Technologies. Insights from a prelim...Harnessing the Potential of Power-to-Gas Technologies. Insights from a prelim...
Harnessing the Potential of Power-to-Gas Technologies. Insights from a prelim...
 
Reinforcement learning, energy systems and deep neural nets
Reinforcement learning, energy systems and deep neural nets Reinforcement learning, energy systems and deep neural nets
Reinforcement learning, energy systems and deep neural nets
 
Soirée des Grands Prix SEE - A glimpse at the research work of the laureate o...
Soirée des Grands Prix SEE - A glimpse at the research work of the laureate o...Soirée des Grands Prix SEE - A glimpse at the research work of the laureate o...
Soirée des Grands Prix SEE - A glimpse at the research work of the laureate o...
 
Reinforcement learning for data-driven optimisation
Reinforcement learning for data-driven optimisationReinforcement learning for data-driven optimisation
Reinforcement learning for data-driven optimisation
 
Electricity retailing in Europe: remarkable events (with a special focus on B...
Electricity retailing in Europe: remarkable events (with a special focus on B...Electricity retailing in Europe: remarkable events (with a special focus on B...
Electricity retailing in Europe: remarkable events (with a special focus on B...
 
Projet de décret « GRD »: quelques remarques du Prof. Damien ERNST
Projet de décret « GRD »: quelques remarques du Prof. Damien ERNSTProjet de décret « GRD »: quelques remarques du Prof. Damien ERNST
Projet de décret « GRD »: quelques remarques du Prof. Damien ERNST
 
Belgian offshore wind potential
Belgian offshore wind potentialBelgian offshore wind potential
Belgian offshore wind potential
 
Time to make a choice between a fully liberal or fully regulated model for th...
Time to make a choice between a fully liberal or fully regulated model for th...Time to make a choice between a fully liberal or fully regulated model for th...
Time to make a choice between a fully liberal or fully regulated model for th...
 
Electrification and the Democratic Republic of the Congo
Electrification and the Democratic Republic of the CongoElectrification and the Democratic Republic of the Congo
Electrification and the Democratic Republic of the Congo
 
Energy: the clash of nations
Energy: the clash of nationsEnergy: the clash of nations
Energy: the clash of nations
 
Smart Grids Versus Microgrids
Smart Grids Versus MicrogridsSmart Grids Versus Microgrids
Smart Grids Versus Microgrids
 
Uber-like Models for the Electrical Industry
Uber-like Models for the Electrical IndustryUber-like Models for the Electrical Industry
Uber-like Models for the Electrical Industry
 

Kürzlich hochgeladen

Main Memory Management in Operating System
Main Memory Management in Operating SystemMain Memory Management in Operating System
Main Memory Management in Operating SystemRashmi Bhat
 
TEST CASE GENERATION GENERATION BLOCK BOX APPROACH
TEST CASE GENERATION GENERATION BLOCK BOX APPROACHTEST CASE GENERATION GENERATION BLOCK BOX APPROACH
TEST CASE GENERATION GENERATION BLOCK BOX APPROACHSneha Padhiar
 
70 POWER PLANT IAE V2500 technical training
70 POWER PLANT IAE V2500 technical training70 POWER PLANT IAE V2500 technical training
70 POWER PLANT IAE V2500 technical trainingGladiatorsKasper
 
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.elesangwon
 
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithm
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithmComputer Graphics Introduction, Open GL, Line and Circle drawing algorithm
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithmDeepika Walanjkar
 
Immutable Image-Based Operating Systems - EW2024.pdf
Immutable Image-Based Operating Systems - EW2024.pdfImmutable Image-Based Operating Systems - EW2024.pdf
Immutable Image-Based Operating Systems - EW2024.pdfDrew Moseley
 
Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________Romil Mishra
 
A brief look at visionOS - How to develop app on Apple's Vision Pro
A brief look at visionOS - How to develop app on Apple's Vision ProA brief look at visionOS - How to develop app on Apple's Vision Pro
A brief look at visionOS - How to develop app on Apple's Vision ProRay Yuan Liu
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating SystemRashmi Bhat
 
Module-1-(Building Acoustics) Noise Control (Unit-3). pdf
Module-1-(Building Acoustics) Noise Control (Unit-3). pdfModule-1-(Building Acoustics) Noise Control (Unit-3). pdf
Module-1-(Building Acoustics) Noise Control (Unit-3). pdfManish Kumar
 
SOFTWARE ESTIMATION COCOMO AND FP CALCULATION
SOFTWARE ESTIMATION COCOMO AND FP CALCULATIONSOFTWARE ESTIMATION COCOMO AND FP CALCULATION
SOFTWARE ESTIMATION COCOMO AND FP CALCULATIONSneha Padhiar
 
Prach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism CommunityPrach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism Communityprachaibot
 
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...Stork
 
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMSHigh Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMSsandhya757531
 
FUNCTIONAL AND NON FUNCTIONAL REQUIREMENT
FUNCTIONAL AND NON FUNCTIONAL REQUIREMENTFUNCTIONAL AND NON FUNCTIONAL REQUIREMENT
FUNCTIONAL AND NON FUNCTIONAL REQUIREMENTSneha Padhiar
 
Comprehensive energy systems.pdf Comprehensive energy systems.pdf
Comprehensive energy systems.pdf Comprehensive energy systems.pdfComprehensive energy systems.pdf Comprehensive energy systems.pdf
Comprehensive energy systems.pdf Comprehensive energy systems.pdfalene1
 
Katarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School CourseKatarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School Coursebim.edu.pl
 
11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdf11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdfHafizMudaserAhmad
 
DEVICE DRIVERS AND INTERRUPTS SERVICE MECHANISM.pdf
DEVICE DRIVERS AND INTERRUPTS  SERVICE MECHANISM.pdfDEVICE DRIVERS AND INTERRUPTS  SERVICE MECHANISM.pdf
DEVICE DRIVERS AND INTERRUPTS SERVICE MECHANISM.pdfAkritiPradhan2
 

Kürzlich hochgeladen (20)

Main Memory Management in Operating System
Main Memory Management in Operating SystemMain Memory Management in Operating System
Main Memory Management in Operating System
 
TEST CASE GENERATION GENERATION BLOCK BOX APPROACH
TEST CASE GENERATION GENERATION BLOCK BOX APPROACHTEST CASE GENERATION GENERATION BLOCK BOX APPROACH
TEST CASE GENERATION GENERATION BLOCK BOX APPROACH
 
Designing pile caps according to ACI 318-19.pptx
Designing pile caps according to ACI 318-19.pptxDesigning pile caps according to ACI 318-19.pptx
Designing pile caps according to ACI 318-19.pptx
 
70 POWER PLANT IAE V2500 technical training
70 POWER PLANT IAE V2500 technical training70 POWER PLANT IAE V2500 technical training
70 POWER PLANT IAE V2500 technical training
 
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
 
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithm
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithmComputer Graphics Introduction, Open GL, Line and Circle drawing algorithm
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithm
 
Immutable Image-Based Operating Systems - EW2024.pdf
Immutable Image-Based Operating Systems - EW2024.pdfImmutable Image-Based Operating Systems - EW2024.pdf
Immutable Image-Based Operating Systems - EW2024.pdf
 
Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________
 
A brief look at visionOS - How to develop app on Apple's Vision Pro
A brief look at visionOS - How to develop app on Apple's Vision ProA brief look at visionOS - How to develop app on Apple's Vision Pro
A brief look at visionOS - How to develop app on Apple's Vision Pro
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating System
 
Module-1-(Building Acoustics) Noise Control (Unit-3). pdf
Module-1-(Building Acoustics) Noise Control (Unit-3). pdfModule-1-(Building Acoustics) Noise Control (Unit-3). pdf
Module-1-(Building Acoustics) Noise Control (Unit-3). pdf
 
SOFTWARE ESTIMATION COCOMO AND FP CALCULATION
SOFTWARE ESTIMATION COCOMO AND FP CALCULATIONSOFTWARE ESTIMATION COCOMO AND FP CALCULATION
SOFTWARE ESTIMATION COCOMO AND FP CALCULATION
 
Prach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism CommunityPrach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism Community
 
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
 
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMSHigh Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
 
FUNCTIONAL AND NON FUNCTIONAL REQUIREMENT
FUNCTIONAL AND NON FUNCTIONAL REQUIREMENTFUNCTIONAL AND NON FUNCTIONAL REQUIREMENT
FUNCTIONAL AND NON FUNCTIONAL REQUIREMENT
 
Comprehensive energy systems.pdf Comprehensive energy systems.pdf
Comprehensive energy systems.pdf Comprehensive energy systems.pdfComprehensive energy systems.pdf Comprehensive energy systems.pdf
Comprehensive energy systems.pdf Comprehensive energy systems.pdf
 
Katarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School CourseKatarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School Course
 
11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdf11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdf
 
DEVICE DRIVERS AND INTERRUPTS SERVICE MECHANISM.pdf
DEVICE DRIVERS AND INTERRUPTS  SERVICE MECHANISM.pdfDEVICE DRIVERS AND INTERRUPTS  SERVICE MECHANISM.pdf
DEVICE DRIVERS AND INTERRUPTS SERVICE MECHANISM.pdf
 

Consequence driven decomposition of large-scale power system security analysis

  • 1. Consequence driven decomposition of large-scale power system security analysis Florence Fonteneau-Belmudes∗, Damien Ernst∗, Christophe Druet†, Patrick Panciatici‡, Louis Wehenkel∗ *University of Li`ege, Belgium - † ELIA (Belgian TSO) - ‡ RTE (French TSO) 2010 IREP Symposium, Buzios, Rio de Janeiro, Brazil, 1-6 August 2010
  • 2. Power system security assessment Power system security assessment = Identifying contingencies/scenarios that could lead to unacceptable operating conditions (dangerous contingencies) if no preventive actions were taken. Problem may be approximated by running a security analysis for every element of a set of potentially dangerous contingencies.
  • 3. Size of this set of potentially dangerous contingencies: • grows with the size of the power system • grows with increasing uncertainties about the future power injection patterns, load patterns and system topologies. Question: What should you do when the size of the set becomes so large that you cannot screen every contingency one by one? 2
  • 4. Traditional solutions: • Increase the computational resources (note that the security analysis task can be easily parallelized). • Use filtering techniques (= simplified conservative analysis techniques) to identify a subset of contingencies on which the full security analysis is carried out. Shortcomings: • Do not work in case of very large number of contingencies (say for example 1010). • Reliable and efficient filtering techniques are difficult to develop. 3
  • 5. Our solution A generic approach to identify dangerous contingencies by running a full security analysis for a number of contingencies greater that the number of dangerous ones but much smaller than the number of potentially dangerous contingencies. Why generic? Work whatever the type of security analysis (e.g., static security, transient stability, voltage stability). Come atop of existing security analysis tools and can be combined with any of them. 4
  • 6. And no magic is necessary for the approach to work... 5
  • 7. How does it work: 1. Draw at random a subset of contingencies C. 2. Run a security analysis for every element of C. Add the dangerous contingencies to the set DC. 3. Use the information collected from the security analyses to draw a new set C more likely to contain new dangerous contingencies. 4. If computational resources are exhausted output DC, else go back to 2. 6
  • 8. 3. Use the information collected from the security analyses to draw a new set C more likely to contain new dangerous contingencies. Tools needed: • A post-processor of the security analysis results to associate to a contingency a severity index (e.g., amount of load lost in the post-fault configuration). • A method to embed the contingency space in a compact metric space where the severity indices vary in a “progressive way”. Solution: 1. Identify among the contingencies already analyzed those with the highest severity index. 2. Identify among a family of sampling densities over the compact metric space, the one which is the most likely to generate the contingencies identified at Step 1. 3. Draw a new set C using the sampling density identified at Step 2. 7
  • 9. Illustrative example Test network: Set of potentially dangerous contingencies: N-1 contigencies, loss of a transmission element, 634 elements. Available computational resources: 125 security analyses (load-flows) can be carried out. What we want: To identify the 6 contingencies that cause an overload on a critical transmission line. 8
  • 10. Tools needed: • A post-processor of the security analysis results to associate to a contingency a severity index (e.g., amount of load lost in the post-fault configuration). • A method to embed the contingency space in a compact metric space where the severity indices vary in a “progressive way”. • Severity index: overload on the critical transmission line. • Compact metric space: the plane is divided into surfaces corresponding to the contingencies according to their location on the geographical map. 9
  • 11. A typical run of the algorithm with multi-dimensional Gaussian sampling densities: Iteration 1 Iteration 2 Iteration 3 Iteration 4 10
  • 12. Probability of finding at least n dangerous contingencies. n Our approach Monte Carlo 1 0.99 0.69 2 0.90 0.31 3 0.76 0.09 4 0.47 0.04 5 0.20 0 6 0.04 0 Comments: • Results get even better with the decrease of the ratio: number of dangerous contingencies number of potentially dangerous contingencies • Many improvements have already been brought to the basic version of the approach presented here. 11
  • 13. Willing to know more... “Consequence driven decomposition of large-scale power system security analysis”. F. Fonteneau-Belmudes, D. Ernst, C. Druet, P. Panciatici and L. Wehenkel. In Proceedings of the 2010 IREP Symposium - Bulk Power Systems Dynamics and Control - VIII, Buzios, Rio de Janeiro, Brazil, 1-6 August 2010. (8 pages). “Pseudo-geographical representations of power system buses by multidimensional scaling”. F. Belmudes, D. Ernst and L. Wehenkel. In Proceedings of the 15th International Conference on Intelligent System Applications to Power Systems (ISAP 2009), Curitiba, Brazil, 8-12 November 2009. (6 pages). “A rare-event approach to build security analysis tools when N − k (k > 1) analyses are needed (as they are in large-scale power systems)”. F. Belmudes, D. Ernst and L. Wehenkel. In Proceedings of the 2009 IEEE Bucharest Power Tech Conference, June 28th-July 2nd, Bucharest, Romania. (8 pages). “Cross-entropy based rare-event simulation for the identification of dangerous events in power systems”. F. Belmudes, D. Ernst and L. Wehenkel. In Proceedings of the 10th International Conference on Probabilistic Methods Applied to Power Systems (PMAPS-08), pages 1290-1295. Rincon, Puerto Rico, 25-29 May 2008. 12